Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 15 Sep 2014 13:48:53 +0200
From: Marcus Meissner <meissner@...e.de>
To: OSS Security List <oss-security@...ts.openwall.com>
Subject: CVE Request: libceph auth token overflow

Hi,

spotted by Brad, has no CVE id yet.

https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c27a3e4d667fdcad3db7b104f75659478e0c68d8

libceph: do not hard code max auth ticket len

We hard code cephx auth ticket buffer size to 256 bytes. This isn't enough for
any moderate setups and, in case tickets themselves are not encrypted, leads to
buffer overflows (ceph_x_decrypt() errors out, but ceph_decode_copy() doesn't -
it's just a memcpy() wrapper). Since the buffer is allocated dynamically
anyway, allocated it a bit later, at the point where we know how much is going
to be needed.

Fixes: http://tracker.ceph.com/issues/8979


Ciao, marcus

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ